Sciweavers

1266 search results - page 59 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
15 years 4 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
MIDDLEWARE
2009
Springer
15 years 10 months ago
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
Abstract. Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environmen...
Vasanth Rajamani, Christine Julien, Jamie Payton, ...
TSMC
2010
14 years 10 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...
AMC
2006
100views more  AMC 2006»
15 years 4 months ago
Reliability evaluation of multi-component cold-standby redundant systems
A new methodology for the reliability evaluation of an l-dissimilar-unit non-repairable cold-standby redundant system is introduced in this paper. Each unit is composed of a numbe...
Amir Azaron, Hideki Katagiri, Kosuke Kato, Masatos...
EUC
2005
Springer
15 years 9 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi